This Article is About
bad rap
selling cds
copyright infringement
cash flow
VPN For P2p And Torrents - Privacy, Security
Join 1000's of Authors at StreetArticles Today!

VPN For P2p And Torrents  -  Privacy, Security

Downloading movies and music online with a VPN for P2Pis convenient. Though torrents get a bad rap, there are users out there that believe its a given right to share media online, and that sharing files with your friends doesn't hurt corporations, but helps them. Selling CDs is not the only source of revenue for record companies, just as DVD sales are not the only way that Hollywood makes money.

In fact, as a fan of torrents, I know that I'm much more likely to go see a new artist in concert if I can hear their music first, but I'm certainly not going to pay for a $20 CD and risk wasting my hard earned cash. In fact, I'm more likely to buy what I like, and many users are like me - if you can't try it for free, it's not worth it. Either way, most people who download torrents use P2P software, and use a VPN for P2P at that.


Well, there are a couple of reasons.

1. Privacy

Though torrent fans are adamant about promoting the right to share files online, there are equally as vehement forces working against them. The DMCA and media distributors are working hard to label these people 'pirates' and 'thieves', and pressure governments into pursuing users that infringe on their cash flow. It's important to know that while now, torrents are still in a very 'gray' area of most countries, there are strong movements to monitor online activity and punish those that download.

Your ISP is most definitely going to keep a record of your online activity, and most governments have the right, or the means to seize servers and extract the data or even track users. Tracking and monitoring is done through IP address. Using a VPN changes your IP address, encrypts your data, and ensure that websites, governments, and your ISP cannot monitor your online activity, regardless of what you do online.

2. Security

New Zealand recently passed a law that means if you are accused by another user or organization of copyright infringement, you are 'guilty until proven innocent', or in other words, the accusation stands as being the truth until otherwise proven. In France, the HADOPI law, much like this new New Zealand law, states that users that are accused of breaking the law can be refused access to or banned from the internet.

Now that's all fine and dandy if it target cyber criminals, hackers, and true thieves. But do the makes of HADOPI know that of 22 million internet users in France, 18 million have records of downloading copyrighted material at one time or another? The process of accusation and punishment may not be as efficient as they originally imagined.

But this is not an article promoting the use of P2P and torrents. The point I'm trying to make is that most of us don't really pay attention to this kind of stuff. We want to watch a movie, and we go download it. Except for the particular interested few, we don't know what the current laws of our country are regarding this subject. Making it more confusing, these torrent downloading sites are perfectly accessible and usable, so how could it get us into any trouble?

And so the idea of securing your online presence comes into play. With a VPN, you actively protect yourself from getting caught up in all this. In fact, some countries in the world like Canada, actually have laws that protect torrent downloaders.


This is why it's important to use a VPN for P2P file sharing. Regardless of where you are or the current laws of your country, you can use an anonymous IP address from a VPN to become part of the network of another country. This works on two levels.

One, if you choose a VPN service from another country, say Hong Kong or The Netherlands, the local laws of that country will apply to you. For example, if some US corporation gets a bug in its behind about what you're downloading and sees that your IP (your fake one from the VPN) is associated with a Hong Kong VPN service, they can do nothing about it. Only when The Hong Kong authorities have a problem with what you're downloading will the Hong Kong VPN service have to respond to court orders.

Two, if you use a VPN IP address from a country where torrents are allowed or even protected, no one will even notice. The US is not going to monitor Canadian IP addresses, and France is not going to measure Russian IPs.


It's important to remind you that I am not encouraging anyone to do anything illegal, and VPN services are not to be used to commit crimes online. Though privacy and security are the main features of VPN services, if you break international laws, then there is a good chance you will get caught. It happens. If you are truly worried about what may happen if you download torrents, be sure to do your due diligence and understand the local laws of your country before downloading.

Street Talk

Rodders, Very informative! Seems odd. I mean, by using this you become in another country and subject to their laws. I'm on a break from watching TV, so the few movies I've seen have been in theatres. I gave up TV for a year and didn't miss it. So I'm continuing more or less. Pretty much sticking with my own CDs for music, too. So I won't be using these... but interesting to learn!! blessings, Cynthia

  about 1 decade ago

Yes, it's all very vague. One of the criticisms of VPNs is that they're used to circumvent local laws. You can look at this in two ways - sure from a US perspective, downloading torrents may be piracy, but from a Chinese perspective, using Twitter and Facebook are a national threat. On a global level, it's just a difference of opinion. In any case, if you break international law through a VPN there are ways to identify you, but most of the time, you activity is going to be 'lost in the cloud'.

  about 1 decade ago

Well, I'm not in China and I'm not downloading stuff, but sometimes I do feel like I get 'lost in the cloud'!!

  about 1 decade ago
You May Also Like
VPN for Torrents
Torrents are a popular way to watch TV, movies, and listen to music online. Though in the media they've been portrayed as piracy and there has been a huge campaign to stop torrent downloading online, there are communities of torrent downloaders that think otherwise. Sharing media online in some circles…
By:  in  Computers and Technology   Apr 02, 2012  
  Likes: 0

VPN For Torrents - 3 Reasons For Anonymous Downloading
Downloading online is quite normal. Did you know that about 5.5 percent of all torrent connections originate in The US? Or that the number of torrent downloaders in Portugal is equal to that of all of Africa? OR that China counts for over 34 percent of all current torrent connections…
By:  in  Computers and Technology   Apr 07, 2012  
  Likes: 0

The Right VPN for Torrents
The habit of internet browsing is something that has become very prevalent in our generation, and people tend to use the internet from many different locations, whether it is sitting in a coffee shop on a laptop, being on a computer in the office or being online on a smartphone…
By: Roderick B in  Computers and Technology   Apr 18, 2013  
  Likes: 0

P2p VPN for Torrents
Torrents have become a very popular way for people to download files online, because downloading and unloading is shared between a large number of users. However, torrents are very controversial, and there have been many debates about whether there should be stronger laws to restrict people from using torrents. To…
By: Roderick B in  Computers and Technology   Apr 19, 2013  
  Likes: 0

Carbohydrates – Do they Have A Bad Rap?
A healthy diet consists of macronutrients which provide our body with needed energy and calories. These nutrients are required in large amounts and there are three classes of macronutrients that include carbohydrates, fats and proteins. The three main functions of macronutrients are that they can provide energy, regulate body functions,…
By: Denise Durband in  Health and Fitness  >  Nutrition   Jun 14, 2012  
  Likes: 0

Do Photographers Need Twitter?
In the age of digital, photographers spend a lot of time at their computer already. There is email, calendars and of course, Photoshop. So do we really need another thing to keep us chained to the computer? It depends on your business. Twitter Even if you don't have an account,…
By: Larry Lourcey in  Internet and Businesses Online  >  Social Media   Dec 05, 2011  
  Likes: 0

Moldovan IP Address on Your Phone & Computer
You can get a Moldovan IP address on your phone and computer even when you're outside the country. This can be useful for accessing Moldova-Only websites, or for getting faster connection speeds to local Moldovan websites. This IP can also be used to hide your real identity online, or be…
By:  in  Computers and Technology   Jul 04, 2012  
  Likes: 2

What Is Doodling? Hey, You There in the Back Row…
Are You Paying Attention? Doodling is my favorite pastime. My whole family doodles. The kids doodle. My friends doodle. We play silly doodle games whenever we get together. What is doodling exactly? It's a form of shorthand drawing, scribbling, if you prefer. Doodling is a very creative outlet for emotional…
By: Joan S in  Arts and Entertainment  >  Visual Graphic Arts   Sep 03, 2012  
  Likes: 10

Top 10 Reasons Why Web Projects Fail - Reasons 2 And 3
Reason #2: 2. No business model How to fail The best way to fail is to build a project and then start thinking how to make money on it. When planning a project it would be better to make sure there is a business model. It does not mean it…
By: Intelex in  Internet and Businesses Online  >  Web Design   Apr 13, 2012  
  Likes: 1

What is Cryp1 Ransomware And How to Remove it
This is an article about a malicious program, which is called Cryp1. It is a virus that enters the user's computer, encrypts all the files that it can, and requires a ransom for their decryption. Such viruses are called ransomware, and are considered the most dangerous types of viruses. Their…
By: John137 in  Computers and Technology  >  Software   Jun 08, 2016  
  Likes: 11

New Interconnecting Cisco Networking Devices Part 2 200 - 105 Icnd2 Exam Latest Dumps
Endexam have different 200-105 Interconnecting Cisco Networking Devices Part 2 (ICND2 v3.0) for different candidates. With these Endexam targeted training, the candidates can pass the exam much easier. A lot of people who participate in the IT professional certification exam was to use Endexam Interconnecting Cisco Networking Devices Part 2…
By: aaron14 in  Computers and Technology  >  Certification Tests   Jun 08, 2016  
  Likes: 2

Killtest Offers Huawei Hcie - storage H13 - 629 Practice Questions And Answers For Learning
After you begin to use the H13-629 study materials together with H13-629 real and original exam questions and answers, you should understand the difference. Case for Huawei qualification can apply regarding employment everywhere in the earth. Huawei qualification may be the identity for ensure. An expert could strengthen his/her capacities…
By: Dolton2016 in  Computers and Technology  >  Certification Tests   Jun 08, 2016  
  Likes: 2

Fix Your Yahoo Issues Via Calling Certified Yahoo Customer Service Experts
Getting problem while working with Yahoo mail? Not to worry! Fix your Yahoo issues by Yahoo customer service. It is the place where you get solution for all your problems. No matter, whether the issue is big or small. For contact number of Yahoo service team you can refer the…
By: Joshua Beers in  Computers and Technology  >  Personal Tech   Jun 07, 2016  
  Likes: 1

App Store Optimization Service | Accumulate New Users for His Apps
Increasing the likelihood of people finding your app through the App Store's organic search all comes down to choosing the right keywords and text for your app's description. Lucky enough, Sensor Tower has great tools to help you app store optimization service here. Use the Keyword Rankings tool to understand…
By: Molly3 in  Computers and Technology  >  Personal Tech   Jun 07, 2016  
  Likes: 1

Three Methods to Restore Iphone After Factory Reset
When you have too many duplicates in your iPhone, you may want to erase all the data and reset iPhone to factory settings. After resetting iPhone, you will get all the data swept from iPhone, and you can restore the files from your iPhone, iTunes backup or iCloud backup. And…
By: ClarkW in  Computers and Technology  >  Data Recovery   Jun 07, 2016  
  Likes: 1

Article Views: 2295    Report this Article